CHAPTER 4. About TMS and the SAN

Size: px
Start display at page:

Download "CHAPTER 4. About TMS and the SAN"

Transcription

1 CHAPTER 4 About TMS and the SAN Recently, during assistance visits to the field, it came to our attention that there is confusion between the Security Assistance Network (SAN) and the Training Management System (TMS). People have a tendency to refer to the SAN as the TMS system and vice versa. Some seem to believe that when they are using the TMS system, they are actually logged on the Security Assistance Network. So let's try to straighten things out a bit and put it in a language that can be understood by all. The Security Assistance Network (SAN) is the term that we use for the world-wide internet based system or network established for the S. A. community. Today the SAN system is used primarily by the S.A. training community. The SAN system provides the following functions: bulletin boards, libraries, internet web page links, training data repository, training data download, an on-line training data system, and it also provides accounts for all who have requested them. The Standardized Training List or STL on the SAN is simply the module that makes available the S.A. training data bases. The Training Management System or TMS is entirely separate. It is a stand alone, data base management system that operates independently on a PC in the training office. The STL data may even be downloaded on a separate computer than the one running TMS. It can simply be copied over to the TMS computer. TMS allows the training manager to identify training needed to fulfill specific training requirements. The training manager inputs all of the data on prospective students, thus establishing a historical database of country personnel trained by the U.S. The Invitational Travel Order (ITO) required by the Joint Security Assistance Training (JSAT) regulation can then be generated by merging data from all of the data bases. TMS generates reports for the training manager on his/her training program as desired. And, in the latest version of TMS, TMS 6.0, the SAO training manager can now upload data on departing students to the Security Assistance Network. SECURITY ASSISTANCE NETWORK The Security Assistance Network (SAN) consists of a telecommunications "gateway," selected options and databases stored at the gateway control point, and automated systems which can be accessed by passing through the gateway. Thus it is through the SAN that users are able to access the various international logistics and financial management systems. The Security Assistance Network, however, is used in an entirely different manner by the training community. The SAN actually plays host to the security assistance training management databases belonging to the military services. The Standardized Training List (STL) and the Military Articles and Services List (MASL) databases are available for data download to the over eighty countries that now have active users on the network. The "stand alone" Training Management System was developed for use at the overseas security assistance office (SAO) level to assist in all phases of the SAO's training management duties. Now with the addition of the international military student offices (IMSOs) at many training installations as active users on the network, the entire security assistance training community is using the SAN. Establishment of the STL and MASL databases at the SAN host and the availability of that data to all users is portrayed in Figure 1-1. The databases from the military service training agencies are transmitted to the SAN in Alexandria VA on a daily/weekly basis (SATFA & NETSAFA daily, AFSAT weekly). There, the separate Army, Navy, and Air Force portions of the S.A. training program are merged together into the Standardized Training List database that literally is the complete 4-1

2 Country training program. Likewise, the MASL data is assembled and is made available to the training managers who have need of this data. With the advent of worldwide internet access, all of our U.S. security assistance offices can now access their training program data via the SAN. FIGURE 4-1 The Worldwide SAN System TRAINING MANAGEMENT SYSTEM The Training Management System (TMS) is a data base management system that operates in a stand alone PC environment at the SAO level. The TMS system is also used by Unified Command training managers. This software provides the training manager the requisite automation that has been needed for such a long time, particularly at the SAO level. Training management data that previously was provided via hard copy only, can now be handled in a modern data base management system that was custom developed for the SAO training manager. The system generates standard reports for the Training Manager. The system then allows for the input of data specific to the individual student. All of the databases are then merged and the Invitational Travel Order is printed by the system. TMS also generates training requests and attachment messages which can be sent through normal . TMS Version 3.1, using the SAN STL data, replaced the manual system which consisted of hard copy printouts of the Standardized Training Listing mailed monthly to the SAO by the Army, Navy, and Air Force training agencies. The MASL was also provided in hard copy format and mailed semi-annually. TMS 3.1, developed in 1990 using Foxpro, was hard coded and could not be changed without using a contractor at considerable expense. Consequently, a 4-2

3 decision was made to use Microsoft Access to develop TMS 4.0 and to do it completely in house by the government. TMS versions 4.1 through 4.3 were subsequently fielded. TMS 5.O, a Microsoft Access 97 runtime program, was fielded in December 1999 and was Y2K compliant. TMS 6.0, a Microsoft Access 2000 and XP runtime program, was fielded in Spring of The latest version of TMS, TMS 6.003, was fielded in September TMS is actually a very sophisticated Microsoft Access application and, as such, offers tremendous flexibility. Additional new databases and functionality are constantly being added, such as the ability to upload data to the Security Assistance Network. TMS is also being completely reprogrammed to support the future Defense Security Assistance Management System (DSAMS) training module. THE SAN WEB SYSTEM The SAN Web system is simply a module on the SAN that provides on-line access to the SAN training databases to all training users. All training activity IMSO offices can now have access to data on their incoming student population. And, the system allows the IMSO in turn to input critical data concerning their training location, their courses, and data about the international military students at their training activity. Fielding of the SAN Web system was begun with all IMSO offices in January The IMSO Web has also been fielded with U.S. Navy, Marine Corps, and U.S. Coast Guard training activities. Fielding with the Air Force is still being accomplished. The cooperation of all service IMSO offices is earnestly sought. SAO training managers can also have access to their country training program data online via the SAO Web system. While the SAO training manager will continue to use TMS for most of their work off line, the SAO Web access provides a unique opportunity for the SAO to view current student status on-line. And, there are hyperlinks that provide access to all training managers at all levels. The most recent community to be given access to the on-line SAN Web system are our International SAN (I-SAN) users. When access has been requested by the SAO for their Country training counterparts, these international users via the parallel I-SAN system can view their country training program data on-line as well as viewing all MASL data. COMMUNICATION BY ELECTRONIC MAIL It is hard to imagine that there were those who did not think that the use of Electronic Mail would have a dramatic effect on the way we implement the S.A. training program. Training program communications that previously were handled by data fax, telephone, and military message are now accomplished via . is now routinely used between the SAO, unified command, military service training offices, and the military school houses. is much less time sensitive in that messages can be sent out when the sender needs to regardless of whether the recipient is available. When he/she comes to work and checks the an answer can be sent quickly and efficiently. Checking the on a regular basis is quite essential, however. permits a user to "attach" any file to an message and send it with the message. Thus TMS generated reports, Invitational Travel Orders, IMS biographical data, and other files can be sent as attachments. TMS will automatically attaches them to an message. Some military service training managers have expressed the fear that we cannot trust the SAO and the school houses to communicate directly via . In accordance with the Joint Security Assistance Training (JSAT) regulation, "routine" communication is permitted and already takes place via phone, fax, and normal message traffic. Again, electronic mail simply provides another means of communication, and the existing policies concerning communications apply similarly to . Actually, the system provides an easy way to send information copies to whomever the sender desires. The task at hand is that of overcoming the human inertia and 4-3

4 resistance of those who have not used in the past and are consequently unfamiliar with its utility and potential. Users of systems must identify the complete Internet addresses of all POCs with whom they routinely communicate. SAN SYSTEM REQUIREMENTS Computer equipment requirements are iterated in Table of the SAMM. All future acquisitions should meet these specifications. This is doubly important because the computer procured may well be used for more than the TMS system or SAN. It may also be used for the Security Assistance Automated Resource Management Systems (SAARMS) module. It is absolutely essential that a robust, fast computer be made available to the TMS and SAARMS users. The best computer should not reside on the SAO Chief s desk, as simply a status symbol. WHO YOU GONNA CALL? What happens when you need help? Who you gonna call? Ghost Busters? Perhaps the following will answer those questions. 1. First of all, try to solve the problem yourself, get help from someone else in your office, perhaps someone with a little more computer experience than you. 2. Are there any computer support personnel in the Embassy or in your command who can help? Try all of your local resources first. 3. Then, call your SAN system administrator for assistance. Available computer support on the unified command staffs varies. 4. In any case, if you have not received the help you need, call DISAM for assistance. That is your next step. In the Preface to this Handbook, the DISAM points of contact for assistance are listed. Please try to ask for the appropriate person. a. Identify--yourself completely, your Country, your specific training program (IMET, FMS, etc.) that you are having a problem with, and the specific WCN training line. b. Please have your facts together and written down. We cannot solve problems when we simply don't know what they are. c. Try to duplicate the problem, cause it to happen again and write down what occurred or use print screen. d. Also it is important that you know your system configuration both in terms of hardware and software. DATA INTEGRITY An awful lot of hard work has gone in to providing good quality, reliable data to the training manager. And, unfortunately, there is still work that remains. From time to time, whole sets of data, such as the STL data for a given FMS Case, is simply not there. In other words, the data simply wasn't uploaded to the SAN (the STL function) by the responsible military service. Sometimes specific data fields are left blank, either because the data wasn't entered by the responsible country manager or there is a military service system problem in that the data is not generated. Regardless of the reason, it is absolutely necessary that SATFA, NETSAFA, and AFSAT verify their data and insure that it is actually there. Performing this function is extremely important. The key word is "ownership." Look at it this way. If there was a problem with the data provided on the "old" hard copy listings, what would be done? The SAO would report the problem to the military service (the country manager), and he or she would correct the problem, perhaps even send a replacement listing. That same "ownership" applies to the military service's data that resides in the STL function (awaiting download by the SAO). It still is the military service s data and they are responsible for its quality. A lot of folks still don't recognize this problem or agree with the obvious solution. Today, the users of TMS have far more visibility of their training data. When there are problems with the data, someone is going to hear about it. With the fielding of the new IMSO Web System, IMSO offices at our training activities are 4-4

5 now busily updating the new detailed training location database. They are also verifying MASL data for training courses at their training activities and inputting recommended MASL database changes to the MILDEPs. We have never before had anyone with this ability to QA our actual MASL data and course descriptions. For the first time there is real optimism that, as a result of what our IMSO offices can now do, the overall quality of our data should dramatically improve. USE OF THE SAN BY THE TRAINING COMMUNITY The Security Assistance Network and the Training Management System have undergone extensive improvement and development to bring them to their current level. Ten years from now we will surely be using telecommunications systems of far greater capability. Never before has DSCA funded a project that was as important to the S.A. training community as the SAN, the SAN Web, and TMS are. It is certainly up to us as training managers to make these systems work for us. 4-5

CHAPTER 1. Using the Training Management System (TMS)

CHAPTER 1. Using the Training Management System (TMS) CHAPTER 1 Using the Training Management System (TMS) A. INSTALLING TMS Installation instructions for TMS are provided in Chapter 2 of this Handbook. B. STARTING TMS Start TMS by double-clicking on the

More information

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives, Virtualization Q&A with an industry leader Virtualization is rapidly becoming a fact of life for agency executives, as the basis for data center consolidation and cloud computing and, increasingly, as

More information

Defense Health Agency Protected Health Information Management Tool (PHIMT)

Defense Health Agency Protected Health Information Management Tool (PHIMT) Defense Health Agency Protected Health Information Management Tool (PHIMT) Training Reference: Privacy Specialist User Guide Version 3.0 March 2011 Any data herein that may be construed as personal information

More information

Defense Health Agency Protected Health Information Management Tool (PHIMT)

Defense Health Agency Protected Health Information Management Tool (PHIMT) Defense Health Agency Protected Health Information Management Tool (PHIMT) Training Reference: Regular User Guide Version 3.0 March 2011 Any data herein that may be construed as personal information is

More information

Security Assistance Network (SAN) User Administration

Security Assistance Network (SAN) User Administration Security Assistance Network (SAN) User Administration Note: All user group administrators can accomplish the following functions for the SAN Web registered users in their user group. Higher level user

More information

Fig (1) sending and receiving s

Fig (1) sending and receiving  s Electronic Mail Protocols (SMTP, POP, IMAP) It is important to (1) distinguish the user interface (i.e., your mail reader) from the underlying message transfer protocols (such as SMTP, POP or IMAP), and

More information

Adding (or modifying) a Prospect Record

Adding (or modifying) a Prospect Record Adding (or modifying) a Prospect Record Prospect Biographical Details Description This script will describe how to use the Biographical Details pages within the Prospect Data component to add a new prospect

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 4525.8 December 26, 2001 USD(AT&L) SUBJECT: DoD Official Mail Management References: (a) DoD Directive 4525.6, "Single Manager for Military Postal Service," May

More information

This document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information.

This document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information. December 2010 CDFM OVERVIEW The American Society of Military Comptrollers offers the Certified Defense Financial Manager (CDFM) program to those persons desiring to demonstrate proficiency in the core

More information

Frequently Asked Questions about the NDIS

Frequently Asked Questions about the NDIS Frequently Asked Questions about the NDIS Contents 3 4 5 5 5 5 6 6 7 7 8 8 8 8 8 9 9 9 9 9 10 10 10 10 11 11 11 11 12 12 12 12 13 13 13 14 14 What is the NDIS and how is it different to current funding

More information

Mobile Communication Devices. 1.0 Purpose. 2.0 Policy NO Virginia Polytechnic Institute and State University

Mobile Communication Devices. 1.0 Purpose. 2.0 Policy NO Virginia Polytechnic Institute and State University Mobile Communication Devices NO. 3960 Policy Effective Date: 3/8/2016 Last Revision Date: Policy Owner: Dwight Shelton Policy Author: (Contact Person) Savita Sharma Affected Parties: Faculty Staff 1.0

More information

Veteran By-Name List

Veteran By-Name List Veteran By-Name List ServicePoint Handbook CONTENTS REVISION HISTORY... 2 SURVEYING VETERANS EXPERIENCING HOMELESSNESS... 3 VETERAN BY-NAME LIST WORKFLOW... 4 1. CLIENT SEARCH/CREATE NEW RECORD... 5 2.

More information

Reading Introduction to Web Accessibility

Reading Introduction to Web Accessibility Reading 8.3 - Introduction to Web Accessibility By WebAIM.org Introduction Most people today can hardly conceive of life without the internet. Some have argued that no other single invention has been more

More information

Sending LESSON PLAN UNIT 1. Essential Question How do you connect with others through ?

Sending  LESSON PLAN UNIT 1. Essential Question How do you connect with others through  ? LESSON PLAN Sending Email UNIT 1 Essential Question How do you connect with others through email? Lesson Overview Students explore how they can use email to communicate with real people within their schools,

More information

UNIFIED VS. FEDERATED

UNIFIED VS. FEDERATED UNIFIED VS. FEDERATED Which Has the Proven Track Record for Managing Information? In a classic case of man versus machine, the unified approach to managing information depends on human judgment and discipline,

More information

United states postal service tracking package

United states postal service tracking package United states postal service tracking package What is a scheduled frequency? A programmed frequency is a specific day or days in which deliveries are made to difficult-to-access populations. What time

More information

ShareSpace Table of Contents

ShareSpace Table of Contents ShareSpace Table of Contents Introduction to ShareSpace...2 Using ShareSpace...3 Signing In...3 Uploading...5 Downloading...6 Inviting to Upload...7 Summary...8 1 Introduction to ShareSpace When it comes

More information

Sending LESSON PLAN UNIT 1. Essential Question How do you connect with others through ? Lesson Overview. Learning Objectives

Sending  LESSON PLAN UNIT 1. Essential Question How do you connect with others through  ? Lesson Overview. Learning Objectives LESSON PLAN Sending Email GRADES K-2 UNIT Essential Question How do you connect with others through email? Lesson Overview Students explore how they can use email to communicate with real people within

More information

Internet Exchange Points An Internet Society Public Policy Briefing

Internet Exchange Points An Internet Society Public Policy Briefing Internet Exchange Points An Internet Society Public Policy Briefing 30 October 2015 Introduction Internet exchange points are physical locations where different networks connect to exchange Internet traffic

More information

Most, but not all, state associations link to the VU web site.

Most, but not all, state associations link to the VU web site. 1 Most, but not all, state associations link to the VU web site. The graphic above was taken from the Arizona association which is one of the biggest promoters of the VU. If you Googled virtual university

More information

Sending LESSON PLAN UNIT 1. Essential Question How do you connect with others through ?

Sending  LESSON PLAN UNIT 1. Essential Question How do you connect with others through  ? LESSON PLAN Sending Email UNIT 1 Essential Question How do you connect with others through email? Lesson Overview Students explore how they can use email to communicate with real people within their schools,

More information

SUPPORT POINT Deficiency Report Program Manager (DRPM)

SUPPORT POINT Deficiency Report Program Manager (DRPM) SUPPORT POINT Deficiency Report Program Manager (DRPM) Product Quality Deficiency Report (PQDR) Receipt In Product Data Reporting and Evaluation Program (PDREP) User Guide July 2018 Table of Contents FOREWORD

More information

Criminals target government funded cell phone program

Criminals target government funded cell phone program #### http://www.kmov.com/news/local/criminals-target-government-funded-cell-phone-progra... Page 1 of 3 Criminals target government funded cell phone program by Chris Nagus KMOV.com Posted on November

More information

Re: Filing of Windstream's Comments to Notice of Proposed Rulemaking; Case No. NNTRC

Re: Filing of Windstream's Comments to Notice of Proposed Rulemaking; Case No. NNTRC New Mexico Office of External Affairs 1660 Old Pecos Trail- Suite D Santa Fe; NM 87505 1:505.9559700 f:505.955.9699 windstream September 19, 2011 Executive Director Navajo Nation Telecommunications Regulatory

More information

Overview: Students explore how they can use to communicate with real people within their schools, families, and communities.

Overview: Students explore how they can use  to communicate with real people within their schools, families, and communities. Sending Email LESSON PLAN Essential Question: How do you connect with others through email? Learning Overview and Objectives Overview: Students explore how they can use email to communicate with real people

More information

CHAPTER 18: CLIENT COMMUNICATION

CHAPTER 18: CLIENT COMMUNICATION CHAPTER 18: CLIENT COMMUNICATION Chapter outline When to communicate with clients What modes of communication to use How much to communicate How to benefit from client communication Understanding your

More information

Oracle Banking Digital Experience

Oracle Banking Digital Experience Oracle Banking Digital Experience FCUBS Originations Saving Account User Manual Release 18.3.0.0.0 Part No. F12056-01 December 2018 Preface FCUBS Originations Saving Account User Manual December 2018 Oracle

More information

Web Content Management

Web Content Management Web Content Management With Drupal Department User Guide Version 1.1 1 Table of Contents Overview 3 Getting Started 3 Writing for the Web 4 Speak to Your Audience 4 Keep it Professional 4 Introducing:

More information

Proposal: [Product Name] User Documentation

Proposal: [Product Name] User Documentation l i s a p r i c e Proposal: [Product Name] User Documentation l i s a @ w r i n k l y b r a i n. c o m w w w. w r i n k l y b r a i n. c o m Introduction As my first project for [Client] as a contractor,

More information

Mail Meets. QR Code. Landing page. A Step-by-Step Guide to Coordinating Your Multi-Channel Direct Marketing MySnail ( )

Mail Meets. QR Code. Landing page. A Step-by-Step Guide to Coordinating Your Multi-Channel Direct Marketing MySnail ( ) Mail Meets PURL QR Code Email Mobile Landing page A Step-by-Step Guide to Coordinating Your Multi-Channel Direct Marketing www.snailworks.com 855-MySnail (697-6245) MULTI-CHANNEL DIRECT MARKETING MAIL

More information

It Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek

It Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek Seite 1 von 5 Issue Date: FoxTalk July 2000 It Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek This month, Paul Maskens and Andy Kramek discuss the problems of validating data entry.

More information

Electronic Official Personnel Folder (eopf) Frequently Asked Questions for Department of the Army Employees

Electronic Official Personnel Folder (eopf) Frequently Asked Questions for Department of the Army Employees Electronic Official Personnel Folder (eopf) Frequently Asked Questions for Department of the Army Employees 1. What is an Official Personnel Folder (OPF)? The Official Personnel Folder (Standard Form 66)

More information

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA STATE OF NORTH CAROLINA AUDIT OF THE INFORMATION SYSTEMS GENERAL CONTROLS ELIZABETH CITY STATE UNIVERSITY JULY 2006 OFFICE OF THE STATE AUDITOR LESLIE MERRITT, JR., CPA, CFP STATE AUDITOR AUDIT OF THE

More information

Advanced Accounting Software & Secure Internet Solutions. Advanced Security Administrator Reference Manual

Advanced Accounting Software & Secure Internet Solutions. Advanced Security Administrator Reference Manual Advanced Accounting Software & Secure Internet Solutions Advanced Security Administrator Reference Manual Version 7.3 Information in this document is subject to change without notice and does not represent

More information

lean information technology service management: bottom-up process improvement that addresses the bottom line

lean information technology service management: bottom-up process improvement that addresses the bottom line lean information technology service management: bottom-up process improvement that addresses the bottom line BY jack white and scott chaiken 22 Contract Management May 2008 By implementing this approach,

More information

IMS Roles Maintenance User Guide

IMS Roles Maintenance User Guide IMS Roles Maintenance User Guide Financial & Membership Services Membership Management Services Version 082011 Last Updated: 8/9/2011 Page 1 of 61 Table of Contents Overview... 3 Role Assignments... 5

More information

GROUPON.COM - PRIVACY POLICY

GROUPON.COM - PRIVACY POLICY PRIVACY STATEMENT Last Updated: September 13, 2012 This Privacy Statement ( Privacy Statement ) explains how Groupon, Inc. ( Groupon, us, our, and we ) uses your information and applies to all who use

More information

EPAF Frequently Asked Questions

EPAF Frequently Asked Questions What is an EPAF? What is the flow of an EPAF? EPAF stands for Electronic Personnel Action Form. An EPAF allows personnel actions to be created and approved electronically, eliminating paper and allowing

More information

How to Get Registered in

How to Get Registered in How to Get Registered in www.sam.gov Basics To receive a grant from ONR Global, whether it be a Collaborative Science Program (CSP) grant or a Naval International Cooperative Opportunities in Science and

More information

Managing Groups Using InFellowship. A guide for Small Group Leaders

Managing Groups Using InFellowship. A guide for Small Group Leaders Managing Groups Using InFellowship A guide for Small Group Leaders 2 3 Managing Groups Using InFellowship Table of Contents MyLifePoint your InFellowship account...4 InFellowship Groups - Your Dashboard...5

More information

CIC Library Automation Directors Security/Authentication Issues in the CIC Virtual Electronic Library March 29, 1996

CIC Library Automation Directors Security/Authentication Issues in the CIC Virtual Electronic Library March 29, 1996 CIC Library Automation Directors Security/Authentication Issues in the CIC Virtual Electronic Library March 29, 1996 This document outlines the major network security and authentication issues related

More information

MACHINE INDEPENDENCE IN COMPILING*

MACHINE INDEPENDENCE IN COMPILING* MACHINE INDEPENDENCE IN COMPILING* Harry D. Huskey University of California Berkeley, California, USA Since 1958, there has been a substantial interest in the development of problem-oriented languages

More information

This Policy applies to all staff and other authorised users in St Therese School.

This Policy applies to all staff and other authorised users in St Therese School. St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

Dheeraj Sanghi. Abstract. In the last few years, there have been a revolution in the telecommunication scenario of

Dheeraj Sanghi. Abstract. In the last few years, there have been a revolution in the telecommunication scenario of NUMBERING PLAN FOR INTERNET TELEPHONY Dheeraj Sanghi Abstract In the last few years, there have been a revolution in the telecommunication scenario of the country. There are new services like paging, cellular,

More information

Web Content Management

Web Content Management Web Content Management With Drupal School Website User Guide Version 1.1 1 Table of Contents Overview 3 Getting Started 4 Writing for the Web 5 Introducing: Your New Website 7 Logging in 7 The Landing

More information

Development and Implementation of an Online Database for Bibliographic Control of Governments Documents in a Selective Depository

Development and Implementation of an Online Database for Bibliographic Control of Governments Documents in a Selective Depository Providence College DigitalCommons@Providence Library Faculty and Staff papers Phillips Memorial Library 1989 Development and Implementation of an Online Database for Bibliographic Control of Governments

More information

NAVIGATING ZOOMGRANTS AND SETTING UP NEW ZOOMGRANTS ACCOUNTS

NAVIGATING ZOOMGRANTS AND SETTING UP NEW ZOOMGRANTS ACCOUNTS 2016 NAVIGATING ZOOMGRANTS AND SETTING UP NEW ZOOMGRANTS ACCOUNTS APPLICANT INSTRUCTIONS REVISED: 01/04/2018 These instructions are intended for new Funding Opportunities released by the Division of Criminal

More information

LUMINATE ONLINE: FUNDAMENTALS-MANAGING CONSTITUENTS

LUMINATE ONLINE: FUNDAMENTALS-MANAGING CONSTITUENTS Constituent360 is an online database that houses constituent profiles and is the center of all things Luminate Online. Learn how each interaction a constituent has with your organization from registrations,

More information

Professional Engineers Ontario. canada s anti-spam. Guidelines for Chapters

Professional Engineers Ontario. canada s anti-spam. Guidelines for Chapters Professional Engineers Ontario canada s anti-spam legislation (CASL) Guidelines for Chapters Published by Association of Professional Engineers of Ontario, February 2015 Contents 1. Introduction... 3 2.

More information

PRIVACY 102 TRAINING FOR SUPERVISORS. PRIVACY ACT OF U.S.C.552a

PRIVACY 102 TRAINING FOR SUPERVISORS. PRIVACY ACT OF U.S.C.552a PRIVACY 102 TRAINING FOR SUPERVISORS PRIVACY ACT OF 1974 5 U.S.C.552a PRIVACY TOOL BOX WEB SITE: WWW.PRIVACY.NAVY.MIL Lists all approved Navy and Marine Corps Privacy Act systems of records DOD systems

More information

Department of the Army Acquisition Career Field Certification Policy and Procedures October 4, 2004

Department of the Army Acquisition Career Field Certification Policy and Procedures October 4, 2004 Department of the Army Acquisition Career Field Certification Policy and Procedures October 4, 2004 1. REFERENCES: (a) Title 10, United States Code, Chapter 87, Defense Acquisition Workforce, Section 1701-1764,

More information

5.0 INTRODUCTION 5.1 OBJECTIVES 5.2 BASIC OPERATIONS

5.0 INTRODUCTION 5.1 OBJECTIVES 5.2 BASIC OPERATIONS Lab Course UNIT 5 E-MAIL Stucture Page No. 5.0 Introduction 152 5.1 Objectives 152 5.2 Basic Operations 152 5.3 Managing Contacts 156 5.4 Lab Exercises 162 5.5 Summary 163 5.6 Further Reading 163 5.0 INTRODUCTION

More information

Product Documentation SAP Business ByDesign February Marketing

Product Documentation SAP Business ByDesign February Marketing Product Documentation PUBLIC Marketing Table Of Contents 1 Marketing.... 5 2... 6 3 Business Background... 8 3.1 Target Groups and Campaign Management... 8 3.2 Lead Processing... 13 3.3 Opportunity Processing...

More information

Session 2. Getting started with a well-structured system specification

Session 2. Getting started with a well-structured system specification Session 2 Getting started with a well-structured system specification COMP 320/420 Spring, 2018 Conrad Weisert The situation A representative approaches us. (or vice versa) He or she may be a. an executive

More information

Security Cooperation Information Portal

Security Cooperation Information Portal U.S. Government (USG)/SCO Token Access Guide June 2017 https://www.scportal.us/ Contents USG/SCO Employee Token Access... 3 General Information... 3 Electronic Token... 3 Tokencode... 3 Permissions...

More information

Admin Plus Pack Option. ExecView Web Console. Backup Exec Admin Console

Admin Plus Pack Option. ExecView Web Console. Backup Exec Admin Console WHITE PAPER Managing Distributed Backup Servers VERITAS Backup Exec TM 9.0 for Windows Servers Admin Plus Pack Option ExecView Web Console Backup Exec Admin Console VERSION INCLUDES TABLE OF CONTENTS STYLES

More information

How does your organization manage Privileged Users?

How does your organization manage Privileged Users? How does your organization manage Privileged Users? A GOVERNMENT & MILITARY SOLUTION GUIDE IONsales@apitech.com www.apitech.com Tel: +1 908-546-3900 Who is ION Networks? ION Networks The most trusted name

More information

It is a Joomla! component add on to the Community Builder (CB) system intended to allow flexible ing to defined user lists.

It is a Joomla! component add on to the Community Builder (CB) system intended to allow flexible  ing to defined user lists. CbMailing User Guide CbMailing version to which this document relates: 2.1 What is it? It is a Joomla! component add on to the Community Builder (CB) system intended to allow flexible e-mailing to defined

More information

PUSHING INFORMATION TO USERS

PUSHING INFORMATION TO USERS PUSHING INFORMATION TO USERS Table of Contents Sharing Elements... 3 The Share function... 4 Sharing elements with users not registered in Metric Insights...11 Understanding Folders (new in Release 5.2)...14

More information

Zoom User Manual. developed. Gary P. Davis. and. David J. Ayersman. for. Students and Employees of New River Community and Technical College

Zoom User Manual. developed. Gary P. Davis. and. David J. Ayersman. for. Students and Employees of New River Community and Technical College Zoom User Manual developed by Gary P. Davis and David J. Ayersman for Students and Employees of Zoom manual.docx Page 1 of 35 Last Updated: August 13, 2018 PREFACE AND OVERVIEW For the fall 2018 term,

More information

TxDOT Internal Audit Materials and Testing Audit Department-wide Report

TxDOT Internal Audit Materials and Testing Audit Department-wide Report Materials and Testing Audit Department-wide Report Introduction This report has been prepared for the Transportation Commission, TxDOT Administration and management. The report presents the results of

More information

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program

More information

SCHEME OF DELEGATION (Based on the model produced to the National Governors Association)

SCHEME OF DELEGATION (Based on the model produced to the National Governors Association) SCHEME OF DELEGATION (Based on the model produced to the National Association) THE PURPOSE OF A SCHEME OF DELEGATION: A scheme of delegation (SoD) is the key document defining which functions have been

More information

Instructions for Gaining Access to PMRT

Instructions for Gaining Access to PMRT 31 October 2017 General Information: Instructions for Gaining Access to PMRT Project Management Resource Tools (PMRT) is accessed via https://pmrt.altess.army.mil/pmrt/. A Common Access Card (CAC) is required

More information

Project Summary. June 15, Local Government School District Collaboration. VoIP Telephone System (Voice over Internet Protocol)

Project Summary. June 15, Local Government School District Collaboration. VoIP Telephone System (Voice over Internet Protocol) June 15, 2005 Project Summary Local Government School District Collaboration VoIP Telephone System (Voice over Internet Protocol) Through the support and vision of City Council and the Trustees of School

More information

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017 This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,

More information

Corporate Online. Using Accounts

Corporate Online. Using Accounts Corporate Online. Using Accounts About this Guide About Corporate Online Westpac Corporate Online is an internet-based electronic platform, providing a single point of entry to a suite of online transactional

More information

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Intermediate School District #917 WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Procedures Manual April 2009 Table of Contents Overview 3 Definitions 3 General Guidelines 4 Eligibility Requirements 5

More information

Freecoms VoIP Mobile Community Telecom S. Ferrari, page n 1»

Freecoms VoIP Mobile Community Telecom S. Ferrari, page n 1» Freecoms VoIP Mobile Community Telecom S. Ferrari, page n 1» Multiservice Mobile VoIP Community Powerful multiservice package: Home and Mobile VoIP communication. Business and Private WEB Portal community

More information

Automatic Purge Implementation Susan L. Straub Alliance Data Dallas, Texas

Automatic  Purge Implementation Susan L. Straub Alliance Data Dallas, Texas Automatic E-mail Purge Implementation Susan L. Straub Alliance Data Dallas, Texas NEED/OPPORTUNITY / Alliance Data was implementing a new automatic e-mail purge policy that would affect every associate

More information

GiftGuide/GiftStory/GiftCalcs User Reference Manual

GiftGuide/GiftStory/GiftCalcs User Reference Manual GiftGuide/GiftStory/GiftCalcs User Reference Manual Copyright (c) 2011 PG Calc Incorporated All rights reserved. Unauthorized use or duplication is prohibited. revised 6/16/2011 Table of Contents Getting

More information

TAMS E-IT. Approvers Manual. How to approve, reject or reassign for further approvals. Approvers Manual 2-1

TAMS E-IT. Approvers Manual. How to approve, reject or reassign for further approvals. Approvers Manual 2-1 TAMS E-IT Approvers Manual How to approve, reject or reassign for further approvals Approvers Manual 2-1 TAMS E-IT Approvers General Information: Approvers will be alerted of an EIT awaiting their action

More information

Statement of Chief Richard Beary President of the International Association of Chiefs of Police

Statement of Chief Richard Beary President of the International Association of Chiefs of Police Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of

More information

NAVY FLIGHT TEST AND THE REAL- TIME TELEMETRY PROCESSING SYSTEM

NAVY FLIGHT TEST AND THE REAL- TIME TELEMETRY PROCESSING SYSTEM NAVY FLIGHT TEST AND THE REAL- TIME TELEMETRY PROCESSING SYSTEM Item Type text; Proceedings Authors Hummel, William R. Publisher International Foundation for Telemetering Journal International Telemetering

More information

MICHIGAN INTERNATIONAL SPEEDWAY KIDS CLUB PRIVACY POLICY

MICHIGAN INTERNATIONAL SPEEDWAY KIDS CLUB PRIVACY POLICY MICHIGAN INTERNATIONAL SPEEDWAY KIDS CLUB Last Modified: October 12, 2012 PRIVACY POLICY Welcome to the Michigan International Speedway Kid s Club website (the Site ). The Site is owned and operated by

More information

Response to Santa Barbara County Grand Jury Reports (1) Santa Barbara County Emergency Operations Center (2) Emergency Public Information

Response to Santa Barbara County Grand Jury Reports (1) Santa Barbara County Emergency Operations Center (2) Emergency Public Information County of Santa Barbara FIRE DEPARTMENT / OFFICE OF EMERGENCY SERVICES 4410 CATHEDRAL OAKS ROAD SANTA BARBARA, CALIFORNIA 93110-1042 TEL 805.681.5526 FAX 805.681.5553 John M. Scherrei Fire Chief Bruce

More information

Ellie Bushhousen, Health Science Center Libraries, University of Florida, Gainesville, Florida

Ellie Bushhousen, Health Science Center Libraries, University of Florida, Gainesville, Florida Cloud Computing Ellie Bushhousen, Health Science Center Libraries, University of Florida, Gainesville, Florida In the virtual services era the term cloud computing has worked its way into the lexicon.

More information

Download, Install and Use Winzip

Download, Install and Use Winzip Download, Install and Use Winzip Something that you are frequently asked to do (particularly if you are in one of my classes) is to either 'zip' or 'unzip' a file or folders. Invariably, when I ask people

More information

Users and roles. Contents

Users and roles. Contents Users and roles Help bits Contents Overview... 3 Users... 4 Operation... 5 Users tab... 6 Creating a new user... 9 Role tab... 10 Editing a role... 11 Creating a new role... 11 Role deletion... 12 Privacy

More information

BPA Worldwide Guide to Outbound Telemarketing Recording

BPA Worldwide Guide to Outbound Telemarketing Recording BPA Worldwide Guide to Outbound Telemarketing Recording Operating Guidelines for Publishing Companies and Telemarketing Agencies Involved in the Acquisition and Requalification of Telecommunication Requests

More information

2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION

2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION 2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION 2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION The annual Jamf Trends Survey looked at Apple in higher education evaluating growth, key drivers

More information

HOW TO ENROLL...3 To Enroll in NBT Online Banker and Bill Pay... 3 Existing NBT Online Banker and NBT Online Banker for Business Users...

HOW TO ENROLL...3 To Enroll in NBT Online Banker and Bill Pay... 3 Existing NBT Online Banker and NBT Online Banker for Business Users... TABLE OF CONTENTS HOW TO ENROLL...3 To Enroll in NBT Online Banker and Bill Pay... 3 Existing NBT Online Banker and NBT Online Banker for Business Users... 4 NAVIGATING YOUR PAYMENT CENTER...5 Payments

More information

THINGS YOU NEED TO KNOW ABOUT USER DOCUMENTATION DOCUMENTATION BEST PRACTICES

THINGS YOU NEED TO KNOW ABOUT USER DOCUMENTATION DOCUMENTATION BEST PRACTICES 5 THINGS YOU NEED TO KNOW ABOUT USER DOCUMENTATION DOCUMENTATION BEST PRACTICES THIS E-BOOK IS DIVIDED INTO 5 PARTS: 1. WHY YOU NEED TO KNOW YOUR READER 2. A USER MANUAL OR A USER GUIDE WHAT S THE DIFFERENCE?

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Defense Information Systems Agency DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base PE 0305208K: Distributed Common Ground/Surface Systems

More information

Adobe Digital Media (Formerly Desktop) Products Enterprise Software Agreement Carahsoft Technology. Blanket Purchase Agreement (BPA) N A-ZF31

Adobe Digital Media (Formerly Desktop) Products Enterprise Software Agreement Carahsoft Technology. Blanket Purchase Agreement (BPA) N A-ZF31 Adobe Digital Media (Formerly Desktop) Products Enterprise Software Agreement Carahsoft Technology Blanket Purchase Agreement (BPA) N00104-12-A-ZF31 (Approved 4/21/14) 1 DOD ESI BPA ORDERING GUIDE This

More information

East End Cooperative Ministry-Development Office Daniel Tilkin, Student Consultant Petrie Holmes, Community Partner

East End Cooperative Ministry-Development Office Daniel Tilkin, Student Consultant Petrie Holmes, Community Partner East End Cooperative Ministry-Development Office Daniel Tilkin, Student Consultant Petrie Holmes, Community Partner Introduction East End Cooperative Ministry (EECM) is a nonprofit interfaith coalition

More information

Privacy Policy. Effective date: 21 May 2018

Privacy Policy. Effective date: 21 May 2018 Privacy Policy Effective date: 21 May 2018 We at Meetingbird know you care about how your personal information is used and shared, and we take your privacy seriously. Please read the following to learn

More information

Oracle Banking Digital Experience

Oracle Banking Digital Experience Oracle Banking Digital Experience Checking Account Originations User Manual Release 18.2.0.0.0 Part No. E97823-01 June 2018 Checkings Account Originations User Manual June 2018 Oracle Financial Services

More information

Department of the Navy Data Server and Data Center Waiver Scope Matrix and FAQ

Department of the Navy Data Server and Data Center Waiver Scope Matrix and FAQ How to use this document in determining Data Server and Data Center Scope: The predominant factor in determining whether a proposed obligation falls under the Data Server and Data Center Waiver requirement

More information

Continued =5.28

Continued =5.28 Chapter Nine Graphing and Introduction to Statistics Learning Objectives: Ch 9 What is mean, medians, and mode? Tables, pictographs, and bar charts Line graphs and predications Creating bar graphs and

More information

Beecher Community School District

Beecher Community School District Beecher Community School District District & Building Communications Protocol What is the system? What is the purpose of Communications System? This system provides clear internal and external communication

More information

B. We may offer you the opportunity to submit other information about yourself (such as gender, age, occupation, hobbies, interests, zip code, etc.

B. We may offer you the opportunity to submit other information about yourself (such as gender, age, occupation, hobbies, interests, zip code, etc. DELANCEYPLACE.COM LLC PRIVACY POLICY DELANCEYPLACE.COM, LLC and its affiliates ( DelanceyPlace, we or us ) operate a website and related social network along with all related applications, software, daily

More information

COS Pivot Profile Overview

COS Pivot Profile Overview COS Pivot Profile Overview COS Pivot contains the largest available collection of searchable profiles of full-time faculty. It provides authoritative information about more than 3 million scholars around

More information

POC User Guide. Financial Disclosure Management

POC User Guide. Financial Disclosure Management POC User Guide Financial Disclosure Management Financial Disclosure Management 8.2.0.17 Publication 1.0 November 2018 Table of Contents Your Role as a Point of Contact (POC)...4 Organize Filers Prior to

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

The Hidden Costs of Free Database Auditing Comparing the total cost of ownership of native database auditing vs. Imperva SecureSphere

The Hidden Costs of Free Database Auditing Comparing the total cost of ownership of native database auditing vs. Imperva SecureSphere Comparing the total cost of ownership of native database auditing vs. Imperva SecureSphere Executive Summary To achieve compliance for regulatory mandates, many organizations turn to the free auditing

More information

Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS

Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS IMPORTANT: This FAQ is intended to assist UofL staff and faculty members to understand their obligations under CASL. It is an overview of

More information

SQL Server Database Provisioning Report. Survey on database provisioning requirements among SQL Server Professionals

SQL Server Database Provisioning Report. Survey on database provisioning requirements among SQL Server Professionals SQL Server Database Provisioning Report Survey on database provisioning requirements among SQL Server Professionals Foreword Waiting until the point of release to see how our software behaves is a key

More information